期刊文献+

面向多跳无线自组织网络的安全信任模型 被引量:4

Security trust model for multi-hop wireless ad hoc networks
下载PDF
导出
摘要 针对大规模无线自组织网络中可能存在的自私节点问题以及恶意节点问题,提出一种基于贝叶斯理论的安全信任模型BTM(Bayesian-based trust model)。在BTM模型中,节点通过对邻近节点的自私或者有害行为进行监测,基于贝叶斯理论对这些直接观测数据进行分析,得到间接判定数据;然后通过节点间间接判定数据的进一步贝叶斯处理,得到节点的信任度,基于此信任度可对网络中的不良节点进行判定。仿真结果表明:BTM算法可对无线网络中的恶意攻击节点、自私节点进行较为准确的判定,能够为网络入侵检测系统、安全路由协议提供有效支持,从而有效提高多跳无线自组织网络的安全性,具有较高的实用价值。 Security is one of the most important factors impacting the practical deployments of ad hoc networks as there may be many selfish or malicious nodes in the networks.A Bayesian inference based trust model,named Bayesian-based Trust Model(BTM),is proposed to address the detection of the selfish or malicious nodes.Under the proposed BTM,nodes in the network keep monitor their neighbors through packets listening.The results are analyzed based on Bayesian inference theory,and the first-hand trust factor is derived.Based on such first-hand trust factor,the nodes derive the second-hand trust factor using another Bayesian procedure.The second-hand trust factor can then be used for selfish or malicious nodes detection.Simulation results show that the proposed BTM can detect and distinguish selfish and malicious nodes accurately,and it is more suitable for intrusion detection system and secure routing protocol than current schemes.
作者 杜君 李伟华
出处 《吉林大学学报(工学版)》 EI CAS CSCD 北大核心 2011年第5期1421-1425,共5页 Journal of Jilin University:Engineering and Technology Edition
基金 '863'国家高技术研究发展计划项目(2006AA01Z406)
关键词 计算机应用 多跳无线自组织网络 信任模型 自私节点 贝叶斯推理 computer application ad hoc network trust model selfish nodes bayesian inference
  • 相关文献

参考文献9

  • 1Gerla M. Ad Hoc Networks: Technologies and Pro- tocols[M]. Boston USA: Springer Science Press, 2004.
  • 2Papadimitratos P, Haas Z J. Secure routing for mo- bile ad hoe networks[C]//In Proc of SCS Communi- cation Networks and Distributed Systems Modeling and Simulation Conference, Courmayeur, Italy, 2002.
  • 3Hu Y C, Perrig A, Johnson D B. Ariadne: a secure on-demand routing protocol for ad hoc networks[J]. Wireless Networks, 2005,11(10) :21-38.
  • 4Capkun S, Buttyan L, Hubaux J P. Self-organized public-key management for mobile ad hoc networks [J]. IEEE Transactions on Mobile Computing, 2003,2 (11): 52-64.
  • 5Yi S, Kravets R. Key management for heterogene- ous ad hoe wireless networks[C] // In Proe of IEEE ICNP, Washington DC, USA,2002.
  • 6Zhou L, Haas Z J. Securing ad hoc networks[J]. IEEE Network, 1999,13(8) :24-30.
  • 7Urpi A, Bonuccelli M, Giordano S. Modeling coop- eration in mobile ad hoc networks: a formal descrip- tion of selfishness[C]//In Proc of Modeling and Op- timization in Mobile, Ad Hoc and Wireless Net- works,Sydney, Australia, 2003.
  • 8Jφsang A. A logic for uncertain probabilities[J]. In- ternational Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2001,9 (3) : 279-311.
  • 9Zeng X, Bagrodia R, Gerla M. GloMoSim: a library for parallel simulation of large-scale wireless net- works[C] // In Proc of Twelfth Workshop on Paral- lel and Distributed Simulation, Alberta, Canada, 1998.

同被引文献30

引证文献4

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部